Lines Matching +full:partition +full:- +full:art

78 .Ux Ns -domain
108 .Bl -tag -width Ds -compact
121 .Xr ssh-agent 1 .
122 This can also be specified on a per-host basis in a configuration file.
127 .Ux Ns -domain
155 .Ux Ns -domain
161 The default value can be set on a host-by-host basis in the
170 is a comma-separated list of ciphers
186 application-level port forwarding.
230 followed by control-Z suspends the connection;
237 Specifies an alternative per-user configuration file.
239 the system-wide configuration file
242 The default for the per-user configuration file is
260 .Ic ssh -f host xterm .
301 .Xr ssh-agent 1
311 a per-host basis in the configuration file.
322 .Pa -cert.pub
337 Note that configuration directives supplied on the command-line generally
344 Enables GSSAPI-based authentication and forwarding (delegation) of GSSAPI
411 This also may be specified on a per-host basis in the configuration file.
426 .Xr ssh-askpass 1
436 A comma-separated list of MAC (message authentication code) algorithms,
462 .Ic ssh -n shadows.cs.hut.fi emacs &
503 command-line flag.
507 .Bl -tag -width Ds -offset indent -compact
623 per-host basis in the configuration file.
629 .Ar cipher-auth
641 .Ar key-ca-sign
643 .Ar key-cert
645 .Ar key-plain
646 (non-certificate key types),
647 .Ar key-sig
649 .Ar protocol-version
739 .Ic -O forward ,
768 Disable pseudo-terminal allocation.
771 Force pseudo-terminal allocation.
773 screen-based programs on a remote machine, which can be very useful,
841 .Dq point-to-point .
849 This can also be specified on a per-host basis in a configuration file.
885 a per-user configuration file and a system-wide configuration file.
892 GSSAPI-based authentication,
893 host-based authentication,
895 keyboard-interactive authentication,
902 Host-based authentication works as follows:
907 on the remote machine, the user is non-root and the user names are
934 The scheme is based on public-key cryptography,
968 .Xr ssh-keygen 1 .
973 (authenticator-hosted ECDSA),
977 (authenticator-hosted Ed25519),
985 (authenticator-hosted ECDSA),
989 (authenticator-hosted Ed25519),
1013 .Xr ssh-keygen 1
1019 .Xr ssh-agent 1
1026 Keyboard-interactive authentication works as follows:
1030 Examples of keyboard-interactive authentication include
1035 .Pf non- Ox
1058 server spoofing or man-in-the-middle attacks,
1066 either executes the given command in a non-interactive session or,
1074 by default will only request a pseudo-terminal (pty) for interactive
1082 If a pseudo-terminal has been allocated, the
1085 If no pseudo-terminal has been allocated,
1094 When a pseudo-terminal has been requested,
1112 .Bl -tag -width Ds
1137 It also allows the cancellation of existing port-forwardings
1150 for dynamic port-forwardings.
1197 .Bd -literal -offset 4n
1198 $ ssh -f -L 6667:localhost:6667 server.example.com sleep 10
1199 $ irc -c '#users' pinky IRC/127.0.0.1
1276 .Xr ssh-keygen 1 :
1278 .Dl $ ssh-keygen -l -f /etc/ssh/ssh_host_rsa_key
1283 .Xr ssh-keygen 1
1291 .Em random art .
1305 To get a listing of the fingerprints along with their random art for
1308 .Dl $ ssh-keygen -lv -f ~/.ssh/known_hosts
1323 .Bd -literal -offset indent
1324 $ ssh-keygen -r host.example.com.
1330 .Dl $ dig -t SSHFP host.example.com
1333 .Bd -literal -offset indent
1334 $ ssh -o "VerifyHostKeyDNS ask" host.example.com
1345 .Sh SSH-BASED VIRTUAL PRIVATE NETWORKS
1350 network pseudo-device,
1360 with remote network 10.0.99.0/24 using a point-to-point connection
1366 .Bd -literal -offset indent
1367 # ssh -f -w 0:1 192.168.1.15 true
1373 .Bd -literal -offset indent
1392 .Dq forced-commands-only :
1393 .Bd -literal -offset 2n
1394 tunnel="1",command="sh /etc/netstart tun1" ssh-rsa ... jane
1395 tunnel="2",command="sh /etc/netstart tun2" ssh-rsa ... john
1398 Since an SSH-based setup entails a fair amount of overhead,
1408 .Bl -tag -width "SSH_ORIGINAL_COMMAND"
1487 .Ux Ns -domain
1492 four space-separated values: client IP address, client port number,
1535 .Bl -tag -width Ds -compact
1537 This file is used for host-based authentication (see above).
1539 world-readable if the user's home directory is on an NFS partition,
1552 but allows host-based authentication without permitting login with
1556 This directory is the default location for all user-specific configuration
1572 This is the per-user configuration file.
1596 sensitive part of this file using AES-128.
1624 This file is for host-based authentication (see above).
1630 but allows host-based authentication without permitting login with
1642 and are used for host-based authentication.
1649 It should be world-readable.
1669 .Xr ssh-add 1 ,
1670 .Xr ssh-agent 1 ,
1671 .Xr ssh-keygen 1 ,
1672 .Xr ssh-keyscan 1 ,
1675 .Xr ssh-keysign 8 ,
1764 .%T Diffie-Hellman Group Exchange for the Secure Shell (SSH) Transport Layer Protocol
1787 .%O International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC '99)
1788 .%T Hash Visualization: a New Technique to improve Real-World Security
1795 removed many bugs, re-added newer features and